<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Internet access rules for proxy and transparent in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Internet-access-rules-for-proxy-and-transparent/m-p/226468#M43535</link>
    <description>&lt;P&gt;The rules should work either in explicit proxy mode or transparent mode.&lt;BR /&gt;However, the gateway does not perform well in explicit proxy mode as the outbound traffic from the gateway will be F2F/slowpath (can't be accelerated by SecureXL).&lt;/P&gt;</description>
    <pubDate>Thu, 12 Sep 2024 21:46:56 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2024-09-12T21:46:56Z</dc:date>
    <item>
      <title>Internet access rules for proxy and transparent</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Internet-access-rules-for-proxy-and-transparent/m-p/226393#M43529</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;&lt;P&gt;I will use checkpoint as gateway to internet and as proxy server.&lt;/P&gt;&lt;P&gt;First i configured rule for proxy as rule 1 on picture&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ChProxy1.PNG" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27582i30B9B309259AB0F0/image-size/large?v=v2&amp;amp;px=999" role="button" title="ChProxy1.PNG" alt="ChProxy1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;And it work.&lt;/P&gt;&lt;P&gt;After this I added rule 2 for transparet access.&lt;/P&gt;&lt;P&gt;After I disabled proxy on browser and enable rule 2 I get internet access.&lt;/P&gt;&lt;P&gt;My question is:&lt;/P&gt;&lt;P&gt;If I want to granulate access to internet with same rules for proxy and transparent, must I duplicate rules?&lt;/P&gt;&lt;P&gt;PS:&lt;/P&gt;&lt;P&gt;One deny rule can work for both method (proxy and transparent)&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 13:36:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Internet-access-rules-for-proxy-and-transparent/m-p/226393#M43529</guid>
      <dc:creator>OlegPowerC</dc:creator>
      <dc:date>2024-09-12T13:36:54Z</dc:date>
    </item>
    <item>
      <title>Re: Internet access rules for proxy and transparent</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Internet-access-rules-for-proxy-and-transparent/m-p/226468#M43535</link>
      <description>&lt;P&gt;The rules should work either in explicit proxy mode or transparent mode.&lt;BR /&gt;However, the gateway does not perform well in explicit proxy mode as the outbound traffic from the gateway will be F2F/slowpath (can't be accelerated by SecureXL).&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 21:46:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Internet-access-rules-for-proxy-and-transparent/m-p/226468#M43535</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-09-12T21:46:56Z</dc:date>
    </item>
    <item>
      <title>Re: Internet access rules for proxy and transparent</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Internet-access-rules-for-proxy-and-transparent/m-p/226663#M43565</link>
      <description>&lt;P&gt;Thank You&lt;/P&gt;</description>
      <pubDate>Sat, 14 Sep 2024 18:20:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Internet-access-rules-for-proxy-and-transparent/m-p/226663#M43565</guid>
      <dc:creator>OlegPowerC</dc:creator>
      <dc:date>2024-09-14T18:20:15Z</dc:date>
    </item>
    <item>
      <title>Re: Internet access rules for proxy and transparent</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Internet-access-rules-for-proxy-and-transparent/m-p/257889#M50564</link>
      <description>&lt;P&gt;For the traffic from Explicit Proxy to Internet? Is Need a rule? Also a NAT rule?&lt;/P&gt;</description>
      <pubDate>Mon, 22 Sep 2025 11:25:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Internet-access-rules-for-proxy-and-transparent/m-p/257889#M50564</guid>
      <dc:creator>Supporto_Checkp</dc:creator>
      <dc:date>2025-09-22T11:25:20Z</dc:date>
    </item>
    <item>
      <title>Re: Internet access rules for proxy and transparent</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Internet-access-rules-for-proxy-and-transparent/m-p/257944#M50580</link>
      <description>&lt;P&gt;Traffic will be seen as originating from the gateway IP in Explicit Proxy, which will be permitted through Implied Rules.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Sep 2025 19:56:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Internet-access-rules-for-proxy-and-transparent/m-p/257944#M50580</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-09-22T19:56:49Z</dc:date>
    </item>
    <item>
      <title>Re: Internet access rules for proxy and transparent</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Internet-access-rules-for-proxy-and-transparent/m-p/257967#M50586</link>
      <description>&lt;P&gt;Thanks, and how can i apply app control or url filtering rule?&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2025 08:22:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Internet-access-rules-for-proxy-and-transparent/m-p/257967#M50586</guid>
      <dc:creator>Supporto_Checkp</dc:creator>
      <dc:date>2025-09-23T08:22:39Z</dc:date>
    </item>
    <item>
      <title>Re: Internet access rules for proxy and transparent</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Internet-access-rules-for-proxy-and-transparent/m-p/257980#M50588</link>
      <description>&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk110013" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk110013&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2025 11:46:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Internet-access-rules-for-proxy-and-transparent/m-p/257980#M50588</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2025-09-23T11:46:49Z</dc:date>
    </item>
    <item>
      <title>Re: Internet access rules for proxy and transparent</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Internet-access-rules-for-proxy-and-transparent/m-p/257998#M50589</link>
      <description>&lt;P&gt;Same as without Explicit Proxy, i.e. the way you configure the rules is exactly the same.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2025 13:53:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Internet-access-rules-for-proxy-and-transparent/m-p/257998#M50589</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-09-23T13:53:56Z</dc:date>
    </item>
    <item>
      <title>Re: Internet access rules for proxy and transparent</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Internet-access-rules-for-proxy-and-transparent/m-p/258024#M50598</link>
      <description>&lt;P&gt;so let me make an example:&lt;/P&gt;&lt;P&gt;Client 10.10.10.1&lt;/P&gt;&lt;P&gt;GW 10.10.10.254&lt;/P&gt;&lt;P&gt;Explicit proxy port=3128&lt;/P&gt;&lt;P&gt;Rule for explicit proxy:&lt;/P&gt;&lt;P&gt;10.10.10.1 ---&amp;gt; 10.10.10.254 service 3128 accept&lt;/P&gt;&lt;P&gt;10.10.1.1 ---&amp;gt;&amp;nbsp; App control Service (for example Facebook) accept ??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2025 16:40:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Internet-access-rules-for-proxy-and-transparent/m-p/258024#M50598</guid>
      <dc:creator>Supporto_Checkp</dc:creator>
      <dc:date>2025-09-23T16:40:47Z</dc:date>
    </item>
    <item>
      <title>Re: Internet access rules for proxy and transparent</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Internet-access-rules-for-proxy-and-transparent/m-p/258033#M50599</link>
      <description>&lt;P&gt;Correct&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2025 18:38:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Internet-access-rules-for-proxy-and-transparent/m-p/258033#M50599</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-09-23T18:38:28Z</dc:date>
    </item>
  </channel>
</rss>

